1 |
Y. Wang, J. Liu, F. Xiao, and J. Dan, “A more Efficient and Secure Dynamic ID-based Remote User Authentication Scheme," Computer Communications, Vol. 32, No. 4, pp. 583-585, 2009.
DOI
|
2 |
Q. Jing, A.V. Vasilakos, J. Wan, J. Lu, and D. Qui, “Security of the Internet of Things:Perspectives and Challenges," Wireless Networks, Vol. 20, No. 8, pp. 2481-2501, 2014.
DOI
|
3 |
S. Sicari, A. Rizzardi, L.A. Grieco, and A. Coen-Porisini, “Security, Privacy and Trust in Internet of Things: The Road Ahead,” Computer Networks, Vol. 76, No. 15, pp. 146-164, 2015.
DOI
|
4 |
YoHan Park, and YoungHo Park, “Secure Private Key Revocation Scheme in Anonymous Cluster-Based MANETs ,” Journal of Korea Multimedia Society, Vol. 18, No. 4, pp. 499-505, 2015.
DOI
|
5 |
S. Kumari, M.K. Khan, and X. Li, “An Improved Remote User Authentication Scheme with Key Agreement,” Computers & Electrical Engineering, Vol. 40, No. 6, pp. 1997-2012, 2014.
DOI
|
6 |
M.L. Das, A. Saxena, and V.P. Gulati, “A Dynamic ID-based Remote User Authentication Scheme,” IEEE Transactions on Consumer Electronics, Vol. 50, No. 2, pp. 629-631, 2004.
DOI
|
7 |
Y. Chang, W. Tai, and H. Chang, “Untraceable Dynamic-identity-based Remote User Authentication Scheme with Verifiable Password Update,” International Journal of Communication Systems, Vol. 27, No. 11, pp. 3430-3440, 2014.
DOI
|
8 |
X. Li, J. Niu, J. Liao, and W. Liang, “Cryptanalysis of a Dynamic Identity-based Remote User Authentication Scheme with Verifiable Password Update,” International Journal of Communication Systems, Vol. 28, No. 2, pp. 374-382, 2015.
DOI
|
9 |
L. Lamport, “Password Authentication with Insecure Communication,” Communications of the ACM, Vol. 24, No. 11, pp. 770-772, 1987.
DOI
|
10 |
M.S. Hwang and L.H. Li, “A New Remote User Authentication Scheme using Smart Cards,” IEEE Transactions on Consumer Electronics, Vol. 46, No. 1, pp. 28-30, 2002.
DOI
|
11 |
B.L. Chen, W.C. Kuo, and L.C. Wuu, “Robust Smart-card-based Remote User Password Authentication Scheme,” International Journal of Communications, Vol. 27, No. 2, pp. 377-389, 2014.
|